Analysis

  • max time kernel
    71s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 14:00

General

  • Target

    https://mega.nz/folder/8vl2mQwS#1ts9hrpzlwZc8ROpRhPu6Q

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/8vl2mQwS#1ts9hrpzlwZc8ROpRhPu6Q
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de44718
      2⤵
        PID:1056
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:4736
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
          2⤵
            PID:4516
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:4336
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:1808
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5096 /prefetch:8
                2⤵
                  PID:4260
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:8
                  2⤵
                    PID:1852
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1996
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5384 /prefetch:8
                    2⤵
                      PID:1864
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                      2⤵
                        PID:4232
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2724
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:1
                        2⤵
                          PID:4520
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                          2⤵
                            PID:944
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                            2⤵
                              PID:3600
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11056370513136634919,8124472830741497319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                              2⤵
                                PID:3228
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2004
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1684
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x4e4 0x500
                                  1⤵
                                    PID:652
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:2556
                                    • C:\Users\Admin\Desktop\Redline Stealer\RedLine.MainPanel-cracked.exe
                                      "C:\Users\Admin\Desktop\Redline Stealer\RedLine.MainPanel-cracked.exe"
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3184

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4f7152bc5a1a715ef481e37d1c791959

                                      SHA1

                                      c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7

                                      SHA256

                                      704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc

                                      SHA512

                                      2e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      ea98e583ad99df195d29aa066204ab56

                                      SHA1

                                      f89398664af0179641aa0138b337097b617cb2db

                                      SHA256

                                      a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6

                                      SHA512

                                      e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6851768c-6fe3-45d5-9460-e7fcc7153593.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      76fa519fcf7502fcf2008a5f8a363e54

                                      SHA1

                                      da4fda26bf547b841a2d558685ac48008458c36b

                                      SHA256

                                      4bd317c159d211c7886b08474f9f81465e9b5f85f82aa822601210e84367f329

                                      SHA512

                                      fef61cdf8efd7c6497ba49882d2be34ec350239b2acb510092576d4255f410fb151070410f1f307da5ba348247abbbd6833bf50ae058e2ddd195b7abc7206c43

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000025

                                      Filesize

                                      17KB

                                      MD5

                                      950eca48e414acbe2c3b5d046dcb8521

                                      SHA1

                                      1731f264e979f18cdf08c405c7b7d32789a6fb59

                                      SHA256

                                      c0bbe530abfce19e06697bc4358eb426e076ccdb9113e22df4a6f32085da67a2

                                      SHA512

                                      27e55525ade4d099a6881011f6e2e0d5d3a9ca7181f4f014dc231d40b3b1907d0d437b0c44d336c25dd7b73209cd773b8563675ac260c43c7752e2d2d694d4d9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      251a9fb88b8194497b41902a5a4fa05e

                                      SHA1

                                      8566249e451425d4474a8590237584a5301171c3

                                      SHA256

                                      4f3f18e493ee4ec767d9a6a8f2df7bc59852a3a109679d389330941503b5d2d6

                                      SHA512

                                      c86a649e99e99293b2958c2b9bfec276f043f5375a84a76a0d771077ff9d95060f004d1517399b343f4278c79db65676ee648a536f4af782c89384ab92497818

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\Origins\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      188B

                                      MD5

                                      008114e1a1a614b35e8a7515da0f3783

                                      SHA1

                                      3c390d38126c7328a8d7e4a72d5848ac9f96549b

                                      SHA256

                                      7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18

                                      SHA512

                                      a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      53909642b39b376f4a5d8443d3cf3127

                                      SHA1

                                      85715f548caf98186c34b1e76439fb46409c8986

                                      SHA256

                                      ec691dfca90ff18225f86dcedf63a065784677476959a70513cc7e80ff90714b

                                      SHA512

                                      8daf6e91f8a499767a9148b0bd37d519adb9d252c28606ec4ef8ec921daa32d15fea969312e5a7d42caaba2037e1172126bc42749e8a4908c8e4bb2c26895a52

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b933062019a8f63e1c118b15619f4aa4

                                      SHA1

                                      9cd8899bd9ee0f0cc6852758c750098cb0f185a2

                                      SHA256

                                      36a6ada08dc286e97b1e6f48523e7fee5f66c3ac5fa5205d9f0020de58da54cb

                                      SHA512

                                      4aea90595c6c9b17b9ebc3e183b89dbc798b3d278f5d27d40c92333bba8a6405952a17f55f4e285e53a94d9419c464ced74216517728e42abc0a837840df9a2a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                      Filesize

                                      41B

                                      MD5

                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                      SHA1

                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                      SHA256

                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                      SHA512

                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      541db7e0b7c8e4d430b4c8c0933234c8

                                      SHA1

                                      afe85cdd188bdcf43981dd79e7b8f6b92d7a74f8

                                      SHA256

                                      3bcc9f82821c08f5a0591cbcce54cf035ea27194d507ca7f9bc74864535081a8

                                      SHA512

                                      5ec35389b877fdae46e509fc7cebd4b18780284fb0f69739abbb07f41c7a00936b01e12018939d353b087929cdfcb89194118eb1b4f62472d9a2a31d2f197863

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57abc1.TMP

                                      Filesize

                                      48B

                                      MD5

                                      073be5fd81e78a55616b40cc1e27ab39

                                      SHA1

                                      8d0f7cf006e5f85170ed27ebf28d0d9398e75f7e

                                      SHA256

                                      f963a337b317e6e6117d536ea97c266f1db5e776a1ae01a8935a9392edbe4fc4

                                      SHA512

                                      d1e0821d340456b9f1921c47d2465319888bcec2e7913cdefb86ddd2302b372d0add6acbe81e4ee0e3960ae042fd98004f1f2ea693543a9f55c8857c3e08bdb2

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      0b71a15209c87d97e817221b4610c5d4

                                      SHA1

                                      402638633a868332eddd83a19b2498a3062b641c

                                      SHA256

                                      3acc6179c8d4bee08ee681a8d85d42bdd75fdb2e5340a83f537fe9459e87331d

                                      SHA512

                                      170bcec935d843d16b7f5e4e4bcb92c83d93bad57c14434b996ee380c82cf1ce6a3c1360a3647bcbc81f7d5337443d737140918b5520c5d05fcb2a719abbf722

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      d36fef029229678219c452e59a4e6e33

                                      SHA1

                                      e1e64312871b7d330b3c5e876b392576da8191d1

                                      SHA256

                                      98e240f36e1dc93d6e4f293e8d3192169bf8775d8b62916b279af51a4d08e792

                                      SHA512

                                      73ccea451f244b41a87112086a72108dfaa40372ed93cad85570d3a37bad2d2957e65a791b3b7e62ce59f7cf670556c626076bef75b7de39f67fba2b4ef08982

                                    • C:\Users\Admin\Downloads\Redline Stealer.zip

                                      Filesize

                                      8.8MB

                                      MD5

                                      bce1691887cd6a96cae244b072b5b871

                                      SHA1

                                      a9ddbe777fcc97bb68caab2e8dcef081b9789871

                                      SHA256

                                      8eca33cd61b65a62c7e5bd000f57e2cfce79af16dab1d0eb7b70c915cfb67907

                                      SHA512

                                      58ed8df9dca75d037aef14710e5d122bdc4030ac4542fbdd6b5f2e101944d25b19fa96145dd058a14dd3a4a059d182ebcd6c04ab1af4b75515d77b4854494506

                                    • memory/3184-218-0x00000000051F0000-0x0000000005202000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/3184-228-0x00000000057D0000-0x0000000005A80000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/3184-217-0x0000000005220000-0x000000000525E000-memory.dmp

                                      Filesize

                                      248KB

                                    • memory/3184-215-0x0000000004D70000-0x0000000004D9A000-memory.dmp

                                      Filesize

                                      168KB

                                    • memory/3184-219-0x00000000052E0000-0x0000000005354000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3184-220-0x0000000005360000-0x00000000053BA000-memory.dmp

                                      Filesize

                                      360KB

                                    • memory/3184-221-0x00000000051E0000-0x00000000051F0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3184-222-0x0000000005280000-0x000000000529C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/3184-223-0x0000000005270000-0x000000000527E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/3184-224-0x0000000005470000-0x0000000005520000-memory.dmp

                                      Filesize

                                      704KB

                                    • memory/3184-225-0x0000000005410000-0x000000000545A000-memory.dmp

                                      Filesize

                                      296KB

                                    • memory/3184-226-0x00000000052C0000-0x00000000052CE000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/3184-227-0x0000000005520000-0x000000000554A000-memory.dmp

                                      Filesize

                                      168KB

                                    • memory/3184-216-0x0000000005150000-0x000000000515A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/3184-229-0x00000000053E0000-0x00000000053FA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/3184-230-0x0000000006030000-0x00000000065D4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/3184-231-0x0000000005600000-0x0000000005692000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/3184-232-0x0000000006C00000-0x0000000007218000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/3184-233-0x0000000005B90000-0x0000000005B9A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/3184-240-0x000000000A080000-0x000000000A092000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/3184-241-0x000000000A290000-0x000000000A2CC000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/3184-242-0x000000000A0E0000-0x000000000A12C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3184-243-0x000000000A8E0000-0x000000000A9EA000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/3184-245-0x000000000AD30000-0x000000000AD80000-memory.dmp

                                      Filesize

                                      320KB

                                    • memory/3184-244-0x000000000A520000-0x000000000A548000-memory.dmp

                                      Filesize

                                      160KB

                                    • memory/3184-214-0x0000000000390000-0x0000000000434000-memory.dmp

                                      Filesize

                                      656KB